7.5
CVSSv2

CVE-2021-35474

Published: 30/06/2021 Updated: 20/09/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based Buffer Overflow vulnerability in cachekey plugin of Apache Traffic Server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #990303 trafficserver: Apache Traffic Server is vulnerable to various HTTP/1x and HTTP/2 attacks Package: trafficserver; Maintainer for trafficserver is Jean Baptiste Favre <debian@jbfavreorg>; Source for trafficserver is src:trafficserver (PTS, buildd, popcon) Reported by: Lorenzo Maurizi <lma ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service, HTTP request smuggling or cache poisoning For the stable distribution (buster), these problems have been fixed in version 802+ds-1+deb10u5 We recommend that you upgrade your trafficserver packages For t ...